Assets and Threats: Quiz 4

Assets and Threats: Quiz 4

Assessment

Quiz

Created by

John Coder

Computers

Professional Development

Hard

Student preview

quiz-placeholder

29 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Data integrity relates to the accuracy and consistency of information. This is known as non-repud_____________, the concept that authenticity of information can't be de___________.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Hash values are primarily used as a way to determine the int___________ of files and applications. Hashes also keep information confi____________ because they can't be decrypted.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

To avoid the risk of hash collisions, functions that generated longer values were needed. MD5's shortcomings gave way to a new group of functions known as the sec________ has_________ algor_________, or SHAs.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Five fun__________ make up the SHA family of algorithms:

SHA-1

SHA-224

SHA-256

SHA-384

SHA-512

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A rainbow table is a file of pre-generated hash values and their associated plaintext. They’re like dictio_________ of weak passwords. Attackers capable of obtaining an organization’s password database can use a rainbow table to compare them against all possible values.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Media Image

Salting is an additional safeguard that's used to strengthen hash functions. A salt is a random str__________ of characters that's added to data before it's hashed. The additional characters produce a more unique hash value, making salted data resilient to rainbow table attacks.

For example, a database containing passwords might have several hashed entries for the password "password." If those passwords were all salted, each entry would be completely different. That means an attacker using a rainbow table would be unable to find matching values for "password" in the database.

8.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Use the sha256sum command to generate the hash of the file1.txt file, and send the output to a new file called file1hash

9.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Use the cmp command to highlight the differences in the file1hash and file2hash files:

10.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Three factors of authentication

The first is kno_________. Authentication by knowledge refers to something the user knows, like a password or the answer to a security question they provided previously.

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?